Adaptive scheduling for task farming with grid middleware H Casanova, MH Kim, JS Plank, JJ Dongarra The International Journal of High Performance Computing Applications 13 (3 …, 1999 | 108 | 1999 |
Privacy protection for data-driven smart manufacturing systems KS Wong, MH Kim International Journal of Web Services Research (IJWSR) 14 (3), 17-32, 2017 | 57 | 2017 |
Fusing visual attention CNN and bag of visual words for cross-corpus speech emotion recognition M Seo, M Kim Sensors 20 (19), 5559, 2020 | 43 | 2020 |
Virtual machine placement with (m, n)-fault tolerance in cloud data center A Zhou, S Wang, CH Hsu, MH Kim, K Wong Cluster Computing 22, 11619-11631, 2019 | 31 | 2019 |
Towards Self‐Awareness Privacy Protection for Internet of Things Data Collection KS Wong, MH Kim Journal of Applied Mathematics 2014 (1), 827959, 2014 | 25 | 2014 |
Agent-based honeynet framework for protecting servers in campus networks IS Kim, MH Kim IET Information Security 6 (3), 202-211, 2012 | 24 | 2012 |
Network failure–aware redundant virtual machine placement in a cloud data center A Zhou, S Wang, CH Hsu, MH Kim, K Wong Concurrency and Computation: Practice and Experience 29 (24), e4290, 2017 | 21 | 2017 |
Secure biometric-based authentication for cloud computing KS Wong, MH Kim Cloud Computing and Services Science: Second International Conference …, 2013 | 20 | 2013 |
Privacy-preserving similarity coefficients for binary data KS Wong, MH Kim Computers & Mathematics with Applications 65 (9), 1280-1290, 2013 | 19 | 2013 |
Dynamic load balancing method based on DNS for distributed web systems JB Moon, MH Kim International Conference on Electronic Commerce and Web Technologies, 238-247, 2005 | 19 | 2005 |
Skyline service selection approach based on QoS prediction Y Guo, S Wang, KS Wong, MH Kim International Journal of Web and Grid Services 13 (4), 425-447, 2017 | 15 | 2017 |
A privacy-preserving biometric matching protocol for iris codes verification KS Wong, MH Kim 2012 Third FTRA International Conference on Mobile, Ubiquitous, and …, 2012 | 14 | 2012 |
Towards Biometric-based Authentication for Cloud Computing. KS Wong, MH Kim CLOSER, 501-510, 2012 | 14 | 2012 |
An enhanced user authentication solution for mobile payment systems using wearables KS Wong, MH Kim Security and Communication Networks 9 (17), 4639-4649, 2016 | 13 | 2016 |
Towards a respondent-preferred k i -anonymity model KS Wong, MH Kim Frontiers of Information Technology & Electronic Engineering 16, 720-731, 2015 | 12 | 2015 |
Privacy-preserving collaborative data anonymization with sensitive quasi-identifiers KS Wong, NA Tu, DM Bui, SY Ooi, MH Kim 2019 12th CMI Conference on Cybersecurity and Privacy (CMI), 1-6, 2019 | 11 | 2019 |
A Study on Legal Ontology Construction DW Jo, MH Kim Journal of the Korea society of computer and information 19 (11), 105-113, 2014 | 10 | 2014 |
Privacy-preserving data collection with self-awareness protection KS Wong, MH Kim Frontier and Innovation in Future Computing and Communications, 365-371, 2014 | 10 | 2014 |
Instance-based ontology matching with rough set features selection CE Yap, MH Kim 2013 International Conference on IT Convergence and Security (ICITCS), 1-4, 2013 | 9 | 2013 |
Generating owl ontology from relational database JW Choi, MH Kim 2012 Third FTRA International Conference on Mobile, Ubiquitous, and …, 2012 | 9 | 2012 |